Skip to content

Commit 2af118d

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rn-fix
2 parents d1501a4 + 4fdac89 commit 2af118d

File tree

2,938 files changed

+20635
-19704
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,938 files changed

+20635
-19704
lines changed

.openpublishing.redirection.json

Lines changed: 25 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -941,11 +941,6 @@
941941
"redirect_url": "/azure/site-recovery/hyper-v-azure-support-matrix",
942942
"redirect_document_id": false
943943
},
944-
{
945-
"source_path": "articles/site-recovery/unregister-vmm-server-script.md",
946-
"redirect_url": "/azure/site-recovery/azure-to-azure-autoupdate",
947-
"redirect_document_id": false
948-
},
949944
{
950945
"source_path": "articles/site-recovery/hyper-v-vmm-secondary-support-matrix.md",
951946
"redirect_url": "/azure/site-recovery/azure-to-azure-autoupdate",
@@ -1001,6 +996,26 @@
1001996
"redirect_url": "/azure/container-registry/container-registry-configure-conditional-access.md",
1002997
"redirect_document_id": false
1003998
},
999+
{
1000+
"source_path": "articles/container-registry/tutorial-artifact-streaming.md",
1001+
"redirect_url": "/azure/container-registry/container-registry-artifact-streaming",
1002+
"redirect_document_id": false
1003+
},
1004+
{
1005+
"source_path": "articles/container-registry/tutorial-artifact-streaming-cli.md",
1006+
"redirect_url": "/azure/container-registry/container-registry-artifact-streaming",
1007+
"redirect_document_id": false
1008+
},
1009+
{
1010+
"source_path": "articles/container-registry/tutorial-artifact-streaming-portal.md",
1011+
"redirect_url": "/azure/container-registry/container-registry-artifact-streaming",
1012+
"redirect_document_id": false
1013+
},
1014+
{
1015+
"source_path": "articles/container-registry/tutorial-artifact-streaming-troubleshoot.md",
1016+
"redirect_url": "/azure/container-registry/troubleshoot-artifact-streaming",
1017+
"redirect_document_id": false
1018+
},
10041019
{
10051020
"source_path": "articles/site-recovery/vmware-physical-secondary-disaster-recovery.md",
10061021
"redirect_url": "/azure/site-recovery/vmware-physical-secondary-architecture",
@@ -22531,6 +22546,11 @@
2253122546
"source_path_from_root": "/articles/virtual-network/ip-services/virtual-networks-static-private-ip-classic-ps.md",
2253222547
"redirect_url": "/updates/azure-classic-resource-providers-will-be-retired-on-31-august-2024/",
2253322548
"redirect_document_id": false
22549+
},
22550+
{
22551+
"source_path_from_root": "/articles/orbital/overview-analytics.md",
22552+
"redirect_url": "/azure/orbital/overview",
22553+
"redirect_document_id": false
2253422554
}
2253522555
]
2253622556
}

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,10 @@
11
---
22
title: Token enrichment - Azure Active Directory B2C
33
description: Enrich tokens with claims from external identity data sources using APIs or outbound webhooks.
4-
54
author: garrodonnell
65
manager: CelesteDG
7-
86
ms.service: active-directory
9-
10-
ms.custom:
117
ms.topic: how-to
12-
138
ms.date: 01/17/2023
149
ms.author: godonnell
1510
ms.subservice: B2C

articles/active-directory-b2c/claim-resolver-overview.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ manager: CelesteDG
99
ms.service: active-directory
1010

1111
ms.topic: reference
12-
ms.date: 01/11/2024
12+
ms.date: 01/17/2024
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515

1616

17-
#Customer intent: As a developer using Azure Active Directory B2C custom policies, I want to understand how to use claim resolvers in my technical profiles, so that I can provide context information about authorization requests and populate claims with dynamic values.
17+
#Customer intent: As a developer using Azure AD B2C custom policies, I want to understand how to use claim resolvers in my technical profiles, so that I can provide context information about authorization requests and populate claims with dynamic values.
1818

1919
---
2020

@@ -122,6 +122,17 @@ Any parameter name included as part of an OIDC or OAuth2 request can be mapped t
122122
| {OAUTH-KV:loyalty_number} | A query string parameter. | 1234 |
123123
| {OAUTH-KV:any custom query string} | A query string parameter. | N/A |
124124

125+
## SAML key-value parameters
126+
127+
In a SAML authentication request, any parameter name that's included in the request, but isn’t specific to the protocol (such as SAMLRequest) can be mapped to a claim in the user journey. For example, the request may include a custom parameter such as `username`. This applies to both SP-Initiated and IDP-Initiated SAML requests.
128+
129+
| Claim | Description | Example |
130+
| ----- | ----------------------- | --------|
131+
| {SAML-KV:username} | A query string or POST body parameter. | [email protected] |
132+
| {SAML-KV:loyalty_number} | A query string or POST body parameter. | 1234 |
133+
| {SAML-KV:any custom query string} | A query string or POST body parameter. | N/A |
134+
135+
125136
## SAML
126137

127138
The following table lists the claim resolvers with information about the SAML authorization request:

articles/active-directory-b2c/conditional-access-identity-protection-overview.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,15 @@
11
---
22
title: Identity Protection and Conditional Access in Azure AD B2C
33
description: Learn how Identity Protection gives you visibility into risky sign-ins and risk detections. Find out how and Conditional Access lets you enforce organizational policies based on risk events in your Azure AD B2C tenants.
4-
54
ms.service: active-directory
65
ms.subservice: conditional-access
76
ms.topic: overview
87
ms.date: 01/11/2024
9-
108
ms.author: kengaderdus
119
author: kengaderdus
1210
manager: CelesteDG
13-
1411
ms.collection: M365-identity-device-management
1512

16-
1713
#Customer intent: As an Azure AD B2C application owner, I want to enhance the security of my applications by using Identity Protection and Conditional Access, so that I can detect and respond to risky authentications and enforce organizational policies.
1814

1915
---

articles/active-directory-b2c/configure-a-sample-node-web-app.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Configure authentication in a sample Node.js web application by using Azure Active Directory B2C (Azure AD B2C)
3-
description: This article discusses how to use Azure Active Directory B2C to sign in and sign up users in a Node.js web application.
3+
description: This article discusses how to use Azure Active Directory B2C to sign in and sign up users in a Node.js web application.
44
titleSuffix: Azure AD B2C
55

66
author: kengaderdus
77
manager: CelesteDG
88
ms.service: active-directory
99

10-
ms.custom: devx-track-js, devx-track-linux
10+
ms.custom: devx-track-js, linux-related-content
1111
ms.topic: how-to
1212
ms.date: 01/11/2024
1313
ms.author: kengaderdus
@@ -20,14 +20,14 @@ ms.subservice: B2C
2020

2121
# Configure authentication in a sample Node.js web application by using Azure Active Directory B2C
2222

23-
This sample article uses a sample Node.js application to show how to add Azure Active Directory B2C (Azure AD B2C) authentication to a Node.js web application. The sample application enables users to sign in, sign out, update profile and reset password using Azure AD B2C user flows. The sample web application uses [Microsoft Authentication Library (MSAL) for Node](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node) to handle authentication and authorization.
23+
This sample article uses a sample Node.js application to show how to add Azure Active Directory B2C (Azure AD B2C) authentication to a Node.js web application. The sample application enables users to sign in, sign out, update profile and reset password using Azure AD B2C user flows. The sample web application uses [Microsoft Authentication Library (MSAL) for Node](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node) to handle authentication and authorization.
2424

2525
In this article, you’ll do the following tasks:
2626

2727
- Register a web application in the Azure portal.
2828
- Create combined **Sign in and sign up**, **Profile editing**, and **Password reset** user flows for the app in the Azure portal.
2929
- Update a sample Node application to use your own Azure AD B2C application and user flows.
30-
- Test the sample application.
30+
- Test the sample application.
3131

3232
## Prerequisites
3333

@@ -37,15 +37,15 @@ In this article, you’ll do the following tasks:
3737

3838
## Step 1: Configure your user flows
3939

40-
[!INCLUDE [active-directory-b2c-app-integration-add-user-flow](../../includes/active-directory-b2c-app-integration-add-user-flow.md)]
40+
[!INCLUDE [active-directory-b2c-app-integration-add-user-flow](../../includes/active-directory-b2c-app-integration-add-user-flow.md)]
4141

4242
## Step 2: Register a web application
4343

44-
To enable your application sign in with Azure AD B2C, register your app in the Azure AD B2C directory. The app registration establishes a trust relationship between the app and Azure AD B2C.
44+
To enable your application sign in with Azure AD B2C, register your app in the Azure AD B2C directory. The app registration establishes a trust relationship between the app and Azure AD B2C.
4545

46-
During app registration, you'll specify the *Redirect URI*. The redirect URI is the endpoint to which the user is redirected by Azure AD B2C after they authenticate with Azure AD B2C. The app registration process generates an *Application ID*, also known as the *client ID*, that uniquely identifies your app. After your app is registered, Azure AD B2C uses both the application ID, and the redirect URI to create authentication requests.
46+
During app registration, you'll specify the *Redirect URI*. The redirect URI is the endpoint to which the user is redirected by Azure AD B2C after they authenticate with Azure AD B2C. The app registration process generates an *Application ID*, also known as the *client ID*, that uniquely identifies your app. After your app is registered, Azure AD B2C uses both the application ID, and the redirect URI to create authentication requests.
4747

48-
### Step 2.1: Register the app
48+
### Step 2.1: Register the app
4949

5050
To register the web app, follow these steps:
5151

@@ -54,7 +54,7 @@ To register the web app, follow these steps:
5454
1. In the Azure portal, search for and select **Azure AD B2C**.
5555
1. Select **App registrations**, and then select **New registration**.
5656
1. Under **Name**, enter a name for the application (for example, *webapp1*).
57-
1. Under **Supported account types**, select **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**.
57+
1. Under **Supported account types**, select **Accounts in any identity provider or organizational directory (for authenticating users with user flows)**.
5858
1. Under **Redirect URI**, select **Web** and then, in the URL box, enter `http://localhost:3000/redirect`.
5959
1. Under **Permissions**, select the **Grant admin consent to openid and offline_access permissions** checkbox.
6060
1. Select **Register**.
@@ -106,7 +106,7 @@ The `views` folder contains Handlebars files for the application's user interfac
106106

107107
## Step 5: Configure the sample web app
108108

109-
Open your web app in a code editor such as Visual Studio Code. Under the project root folder, open the *.env* file. This file contains information about your Azure AD B2C identity provider. Update the following app settings properties:
109+
Open your web app in a code editor such as Visual Studio Code. Under the project root folder, open the *.env* file. This file contains information about your Azure AD B2C identity provider. Update the following app settings properties:
110110

111111
|Key |Value |
112112
|---------|---------|
@@ -129,7 +129,7 @@ Your final configuration file should look like the following sample:
129129
You can now test the sample app. You need to start the Node server and access it through your browser on `http://localhost:3000`.
130130

131131
1. In your terminal, run the following code to start the Node.js web server:
132-
132+
133133
```bash
134134
node index.js
135135
```
@@ -147,19 +147,19 @@ You can now test the sample app. You need to start the Node server and access it
147147

148148
### Test profile editing
149149

150-
1. After you sign in, select **Edit profile**.
151-
1. Enter new changes as required, and then select **Continue**. You should see the page with sign-in status with the new changes, such as **Given Name**.
150+
1. After you sign in, select **Edit profile**.
151+
1. Enter new changes as required, and then select **Continue**. You should see the page with sign-in status with the new changes, such as **Given Name**.
152152

153153
### Test password reset
154154

155-
1. After you sign in, select **Reset password**.
155+
1. After you sign in, select **Reset password**.
156156
1. In the next dialog that appears, you can cancel the operation by selecting **Cancel**. Alternatively, enter your email address, and then select **Send verification code**. You'll receive a verification code to your email account. Copy the verification code in your email, enter it into the password reset dialog, and then select **Verify code**.
157157
1. Select **Continue**.
158158
1. Enter your new password, confirm it, and then select **Continue**. You should see the page that shows sign-in status.
159159
160160
### Test sign-out
161161
162-
After you sign in, select **Sign out**. You should see the page that has a **Sign in** button.
162+
After you sign in, select **Sign out**. You should see the page that has a **Sign in** button.
163163
164164
## Next steps
165165

articles/active-directory-b2c/configure-authentication-sample-python-web-app.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -86,24 +86,21 @@ Extract the sample file to a folder where the total length of the path is 260 or
8686

8787
In the project's root directory, follow these steps:
8888

89-
1. Rename the *app_config.py* file to *app_config.py.OLD*.
90-
1. Rename the *app_config_b2c.py* file to *app_config.py*. This file contains information about your Azure AD B2C identity provider.
91-
92-
1. Create an `.env` file in the root folder of the project using `.env.sample.b2c` as a guide.
89+
1. Create an `.env` file in the root folder of the project using `.env.sample` as a guide.
9390

9491
```shell
9592
FLASK_DEBUG=True
96-
TENANT_NAME=<tenant name>
93+
B2C_TENANT_NAME=<tenant name>
9794
CLIENT_ID=<client id>
9895
CLIENT_SECRET=<client secret>
99-
SIGNUPSIGNIN_USER_FLOW=B2C_1_profile_editing
100-
EDITPROFILE_USER_FLOW=B2C_1_reset_password
101-
RESETPASSWORD_USER_FLOW=B2C_1_signupsignin1
96+
SIGNUPSIGNIN_USER_FLOW=B2C_1_signupsignin1
97+
EDITPROFILE_USER_FLOW=B2C_1_profile_editing
98+
RESETPASSWORD_USER_FLOW=B2C_1_reset_password
10299
```
103100

104101
|Key |Value |
105102
|---------|---------|
106-
|`TENANT_NAME`| The first part of your Azure AD B2C [tenant name](tenant-management-read-tenant-name.md#get-your-tenant-name) (for example, `contoso`). |
103+
|`B2C_TENANT_NAME`| The first part of your Azure AD B2C [tenant name](tenant-management-read-tenant-name.md#get-your-tenant-name) (for example, `contoso`). |
107104
|`CLIENT_ID`| The web API application ID from [step 2.1](#step-21-register-the-app).|
108105
|`CLIENT_SECRET`| The client secret value you created in [step 2.2](#step-22-create-a-web-app-client-secret). |
109106
|`*_USER_FLOW`|The user flows you created in [step 1](#step-1-configure-your-user-flow).|

articles/active-directory-b2c/configure-tokens.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,10 @@ manager: CelesteDG
66
ms.service: active-directory
77
ms.topic: how-to
88
ms.date: 01/11/2024
9-
ms.custom:
109
ms.author: kengaderdus
1110
ms.subservice: B2C
1211
zone_pivot_groups: b2c-policy-type
1312

14-
1513
#Customer intent: As a developer configuring token lifetimes in Azure Active Directory B2C, I want to understand the options and settings available for token lifetime and compatibility, so that I can customize them to fit the needs of my application and ensure secure access to resources.
1614

1715
---

articles/active-directory-b2c/configure-user-input.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,11 @@
22
title: Add user attributes and customize user input
33
titleSuffix: Azure AD B2C
44
description: Learn how to customize user input and add user attributes to the sign-up or sign-in journey in Azure Active Directory B2C.
5-
65
author: garrodonnell
76
manager: CelesteDG
8-
97
ms.service: active-directory
10-
118
ms.topic: how-to
129
ms.date: 12/13/2023
13-
ms.custom:
1410
ms.author: godonnell
1511
ms.subservice: B2C
1612
zone_pivot_groups: b2c-policy-type

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
177177
| ------- | :--: | ----- |
178178
| Azure portal | GA | |
179179
| [Application Insights user journey logs](troubleshoot-with-application-insights.md) | Preview | Used for troubleshooting during development. |
180-
| [Application Insights event logs](analytics-with-application-insights.md) | Preview | Used to monitor user flows in production. |
180+
| [Application Insights event logs](analytics-with-application-insights.md) | Preview | Used to monitor user flows and custom policies in production. |
181181

182182
## Other features
183183

0 commit comments

Comments
 (0)